Skip to content

Commit

Permalink
Add potential secret leak for sharks crate (#2136)
Browse files Browse the repository at this point in the history
* Add potential secret leak for sharks crate

* drop comments

---------

Co-authored-by: Sergey "Shnatsel" Davidoff <[email protected]>
  • Loading branch information
RyanSquared and Shnatsel authored Nov 17, 2024
1 parent 509528f commit 874d406
Showing 1 changed file with 45 additions and 0 deletions.
45 changes: 45 additions & 0 deletions crates/sharks/RUSTSEC-0000-0000.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
```toml
[advisory]
id = "RUSTSEC-0000-0000"
package = "sharks"
date = "2024-11-16"
url = "https://git.distrust.co/public/blahaj/commit/4faab1cd33d455f0ca2ccc7208093fd6c18e0767"
categories = ["crypto-failure"]
keywords = ["shamir", "cryptography", "sss"]

[versions]
patched = []

[affected]
```

# Bias of Polynomial Coefficients in Secret Sharing

Affected versions of this crate allowed for a bias when generating random
polynomials for Shamir Secret Sharing, where instead of being within the range
`[0, 255]` they were instead in the range `[1, 255]`. A description from
Cure53, who originally found the issue, is available:

> The correct method to select a random polynomial would be to select
all coefficients (including the most significant coefficient) uniformly
in the range 0..255 (inclusive). Otherwise, knowledge that a coefficient
in a polynomial cannot be 0 permits the exclusion of single byte values
for the shared secret given one share less than required. [...]
Exploiting this weakness necessitates sharing the same secret multiple
times. In this scenario, an attacker could exclude an exponential number
of values for each of the shared bytes until sufficiently few values
remain for brute forcing. Cure53 estimates that under ideal
circumstances (e.g., a 2-out-of-N scheme) a shared secret can be
reconstructed if the same secret has been distributed 500-1500 times.

Secrets that have been shared a low amount of times (ideally, once) would not
be impacted. However, secrets that are repeatedly shared may be vulnerable,
especially if the shares are still available, and should be rotated.

The vulnerability does not impact reconstitution of secrets: secrets that have
already been split can be recombined without issue.

The flaw can be corrected by changing the lower bound of the polynomial
coefficient range in the `sharks::math::random_polynomial` function to `0`. The
`blahaj` crate has been made available with a fixed version of the code, after
attempts to reach the maintainer of the `sharks` crate were unsuccessful.

0 comments on commit 874d406

Please sign in to comment.